Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
15/11/2023, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
59a9da7200965139a59c8785df7fc121ad0c0857e22e6dd161ecc1eea1a7169a.dll
Resource
win7-20231023-en
General
-
Target
59a9da7200965139a59c8785df7fc121ad0c0857e22e6dd161ecc1eea1a7169a.dll
-
Size
1.3MB
-
MD5
0341d867e0e111f927a9a1ae679ec9af
-
SHA1
9c93cfcc7ca9365f4052a4f047175fad50b1a356
-
SHA256
59a9da7200965139a59c8785df7fc121ad0c0857e22e6dd161ecc1eea1a7169a
-
SHA512
db276a8df88c7183b4f703dc8d374f1878b7b9acdec8df8ca703215680aa33952519d42a8f23b717841efe6aff91f1adf6be4478836f1d6870115a4e563a162a
-
SSDEEP
12288:ntCtvNv+h26xiWZu8xDPtgPuSYAuXIPY2wKg7oGviTVp7OC0aO:ntChNv+ceiWjDVgyAurCg7osJ1
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1208-4-0x0000000002AC0000-0x0000000002AC1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/2344-0-0x000007FEF5B00000-0x000007FEF5C4E000-memory.dmp dridex_payload behavioral1/memory/1208-31-0x0000000140000000-0x000000014014E000-memory.dmp dridex_payload behavioral1/memory/1208-38-0x0000000140000000-0x000000014014E000-memory.dmp dridex_payload behavioral1/memory/1208-49-0x0000000140000000-0x000000014014E000-memory.dmp dridex_payload behavioral1/memory/1208-51-0x0000000140000000-0x000000014014E000-memory.dmp dridex_payload behavioral1/memory/2344-52-0x000007FEF5B00000-0x000007FEF5C4E000-memory.dmp dridex_payload behavioral1/memory/2492-67-0x000007FEF5B00000-0x000007FEF5C50000-memory.dmp dridex_payload behavioral1/memory/2492-71-0x000007FEF5B00000-0x000007FEF5C50000-memory.dmp dridex_payload behavioral1/memory/900-88-0x000007FEF5AC0000-0x000007FEF5C42000-memory.dmp dridex_payload behavioral1/memory/900-84-0x000007FEF5AC0000-0x000007FEF5C42000-memory.dmp dridex_payload behavioral1/memory/2580-109-0x000007FEF5B00000-0x000007FEF5C4F000-memory.dmp dridex_payload behavioral1/memory/2580-113-0x000007FEF5B00000-0x000007FEF5C4F000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 2492 rrinstaller.exe 900 Utilman.exe 2580 psr.exe -
Loads dropped DLL 7 IoCs
pid Process 1208 Process not Found 2492 rrinstaller.exe 1208 Process not Found 900 Utilman.exe 1208 Process not Found 2580 psr.exe 1208 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\Brtwovgetqxkjn = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\2yDmgk\\Utilman.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rrinstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utilman.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2344 rundll32.exe 2344 rundll32.exe 2344 rundll32.exe 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1208 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1208 wrote to memory of 2708 1208 Process not Found 28 PID 1208 wrote to memory of 2708 1208 Process not Found 28 PID 1208 wrote to memory of 2708 1208 Process not Found 28 PID 1208 wrote to memory of 2492 1208 Process not Found 29 PID 1208 wrote to memory of 2492 1208 Process not Found 29 PID 1208 wrote to memory of 2492 1208 Process not Found 29 PID 1208 wrote to memory of 1276 1208 Process not Found 32 PID 1208 wrote to memory of 1276 1208 Process not Found 32 PID 1208 wrote to memory of 1276 1208 Process not Found 32 PID 1208 wrote to memory of 900 1208 Process not Found 33 PID 1208 wrote to memory of 900 1208 Process not Found 33 PID 1208 wrote to memory of 900 1208 Process not Found 33 PID 1208 wrote to memory of 2840 1208 Process not Found 34 PID 1208 wrote to memory of 2840 1208 Process not Found 34 PID 1208 wrote to memory of 2840 1208 Process not Found 34 PID 1208 wrote to memory of 2580 1208 Process not Found 35 PID 1208 wrote to memory of 2580 1208 Process not Found 35 PID 1208 wrote to memory of 2580 1208 Process not Found 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\59a9da7200965139a59c8785df7fc121ad0c0857e22e6dd161ecc1eea1a7169a.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2344
-
C:\Windows\system32\rrinstaller.exeC:\Windows\system32\rrinstaller.exe1⤵PID:2708
-
C:\Users\Admin\AppData\Local\oKjEEJ\rrinstaller.exeC:\Users\Admin\AppData\Local\oKjEEJ\rrinstaller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2492
-
C:\Windows\system32\Utilman.exeC:\Windows\system32\Utilman.exe1⤵PID:1276
-
C:\Users\Admin\AppData\Local\mOJhR\Utilman.exeC:\Users\Admin\AppData\Local\mOJhR\Utilman.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:900
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵PID:2840
-
C:\Users\Admin\AppData\Local\XBKr9aE\psr.exeC:\Users\Admin\AppData\Local\XBKr9aE\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD58a3f9e3f454cc3641966d4d6890dbc11
SHA1f7e5e62f9a4e72dd6e092935121c08126110a635
SHA256906b1be9217133b5daae621c23bfe3bdbc4313f104b0cc405d7064bd01b7e679
SHA512f43deba708cf798af76576d93f964cac2ae5a8e1f9bdc314184a672884ae04be0a4e6b0de06927d13e4de5ecb4aac9f7184b187f46107edb01b7ca814f43c03f
-
Filesize
715KB
MD5a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774
-
Filesize
715KB
MD5a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774
-
Filesize
1.5MB
MD552a34d1a05782bbaa7a8b77588d691f4
SHA15ea08473ceb0eb079b9bd6f9d4af06dd7780639e
SHA256e54c15a9482ac0a50b50de8272324f8a305f3ac7c19d813932db632218c74d5b
SHA51233b93053f2967d20b76f848f16ea1bfed91467221131220a69d277918109fba0c65b48ebef21fd1245b384ee1a4475bb71f144f53fe4f99d2816b789a1fe31d2
-
Filesize
1.3MB
MD532c5ee55eadfc071e57851e26ac98477
SHA18f8d0aee344e152424143da49ce2c7badabb8f9d
SHA2567ca90616e68bc851f14658a366d80f21ddb7a7dd8a866049e54651158784a9ea
SHA512e0943efa81f3087c84a5909c72a436671ee8cc3cc80154901430e83ec7966aac800ad4b26f4a174a0071da617c0982ceda584686c6e2056e1a83e864aca6c975
-
Filesize
1.3MB
MD532c5ee55eadfc071e57851e26ac98477
SHA18f8d0aee344e152424143da49ce2c7badabb8f9d
SHA2567ca90616e68bc851f14658a366d80f21ddb7a7dd8a866049e54651158784a9ea
SHA512e0943efa81f3087c84a5909c72a436671ee8cc3cc80154901430e83ec7966aac800ad4b26f4a174a0071da617c0982ceda584686c6e2056e1a83e864aca6c975
-
Filesize
1.3MB
MD5be1c23bbc51c64b1df465270722855a3
SHA18f1a580c325a76e3f4d1a9ac1e7c70404d37eea7
SHA256a5533ded5e901d409aa6f389734ff99b260f3ed585f3fa5d327ce77f57acd90b
SHA512d1c2504343c8840360b259a1a2c31dd90b300ccc934d08baff58a5ba87c7e9c59eeb02a4d2c00b9782069cf402557ff4ea5c3018617ca625c2266948b2d15c80
-
Filesize
54KB
MD50d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4
-
Filesize
54KB
MD50d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4
-
Filesize
1.3MB
MD58a3f9e3f454cc3641966d4d6890dbc11
SHA1f7e5e62f9a4e72dd6e092935121c08126110a635
SHA256906b1be9217133b5daae621c23bfe3bdbc4313f104b0cc405d7064bd01b7e679
SHA512f43deba708cf798af76576d93f964cac2ae5a8e1f9bdc314184a672884ae04be0a4e6b0de06927d13e4de5ecb4aac9f7184b187f46107edb01b7ca814f43c03f
-
Filesize
1KB
MD53b611be5e8eb797c740e04985522c75d
SHA14657c029b047c4cf061b7d6be70e6f0c04a81618
SHA256d35be264e5f6f9086672fee03df7798c0e4c7f5ab1be8e4bdbec5e7a9de54888
SHA512200621e88d4e69fe746ce5108df4168f8751cefaa1df389b169a7db26de24abc032c8d14d2a99cb5108284b9b18b8020e8aef94ff3364656262cb20befd78fc8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3618187007-3650799920-3290345941-1000\X8bq\MFPlat.DLL
Filesize1.3MB
MD5be1c23bbc51c64b1df465270722855a3
SHA18f1a580c325a76e3f4d1a9ac1e7c70404d37eea7
SHA256a5533ded5e901d409aa6f389734ff99b260f3ed585f3fa5d327ce77f57acd90b
SHA512d1c2504343c8840360b259a1a2c31dd90b300ccc934d08baff58a5ba87c7e9c59eeb02a4d2c00b9782069cf402557ff4ea5c3018617ca625c2266948b2d15c80
-
Filesize
1.5MB
MD552a34d1a05782bbaa7a8b77588d691f4
SHA15ea08473ceb0eb079b9bd6f9d4af06dd7780639e
SHA256e54c15a9482ac0a50b50de8272324f8a305f3ac7c19d813932db632218c74d5b
SHA51233b93053f2967d20b76f848f16ea1bfed91467221131220a69d277918109fba0c65b48ebef21fd1245b384ee1a4475bb71f144f53fe4f99d2816b789a1fe31d2
-
Filesize
1.3MB
MD58a3f9e3f454cc3641966d4d6890dbc11
SHA1f7e5e62f9a4e72dd6e092935121c08126110a635
SHA256906b1be9217133b5daae621c23bfe3bdbc4313f104b0cc405d7064bd01b7e679
SHA512f43deba708cf798af76576d93f964cac2ae5a8e1f9bdc314184a672884ae04be0a4e6b0de06927d13e4de5ecb4aac9f7184b187f46107edb01b7ca814f43c03f
-
Filesize
715KB
MD5a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774
-
Filesize
1.5MB
MD552a34d1a05782bbaa7a8b77588d691f4
SHA15ea08473ceb0eb079b9bd6f9d4af06dd7780639e
SHA256e54c15a9482ac0a50b50de8272324f8a305f3ac7c19d813932db632218c74d5b
SHA51233b93053f2967d20b76f848f16ea1bfed91467221131220a69d277918109fba0c65b48ebef21fd1245b384ee1a4475bb71f144f53fe4f99d2816b789a1fe31d2
-
Filesize
1.3MB
MD532c5ee55eadfc071e57851e26ac98477
SHA18f8d0aee344e152424143da49ce2c7badabb8f9d
SHA2567ca90616e68bc851f14658a366d80f21ddb7a7dd8a866049e54651158784a9ea
SHA512e0943efa81f3087c84a5909c72a436671ee8cc3cc80154901430e83ec7966aac800ad4b26f4a174a0071da617c0982ceda584686c6e2056e1a83e864aca6c975
-
Filesize
1.3MB
MD5be1c23bbc51c64b1df465270722855a3
SHA18f1a580c325a76e3f4d1a9ac1e7c70404d37eea7
SHA256a5533ded5e901d409aa6f389734ff99b260f3ed585f3fa5d327ce77f57acd90b
SHA512d1c2504343c8840360b259a1a2c31dd90b300ccc934d08baff58a5ba87c7e9c59eeb02a4d2c00b9782069cf402557ff4ea5c3018617ca625c2266948b2d15c80
-
Filesize
54KB
MD50d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4
-
Filesize
715KB
MD5a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774